You are currently viewing a new version of our website. To view the old version click .

63 Results Found

  • Article
  • Open Access
3 Citations
5,401 Views
18 Pages

4 June 2015

Since Advanced Encryption Standard (AES) in stream modes, such as counter (CTR), output feedback (OFB) and cipher feedback (CFB), can meet most industrial requirements, the range of applications for dedicated stream ciphers is decreasing. There are m...

  • Article
  • Open Access
1 Citations
1,986 Views
19 Pages

10 August 2023

The rise of modern cryptographic protocols such as Zero-Knowledge proofs and secure Multi-party Computation has led to an increased demand for a new class of symmetric primitives. Unlike traditional platforms such as servers, microcontrollers, and de...

  • Article
  • Open Access
5 Citations
4,188 Views
20 Pages

Risk Measurement Method for Privilege Escalation Attacks on Android Apps Based on Process Algebra

  • Limin Shen,
  • Hui Li,
  • Hongyi Wang,
  • Yihuan Wang,
  • Jiayin Feng and
  • Yuqing Jian

On the Android platform, information leakage can use an application-layer privilege escalation attack composed of multi-app collusion. However, the detection effect of a single app that can construct privilege escalation attacks is not good. Furtherm...

  • Article
  • Open Access
2 Citations
1,867 Views
17 Pages

Efficient Attack Scheme against SKINNY-64 Based on Algebraic Fault Analysis

  • Xing Fang,
  • Hongxin Zhang,
  • Xiaotong Cui,
  • Yuanzhen Wang and
  • Linxi Ding

7 June 2023

Lightweight block ciphers are normally used in low-power resource-constrained environments, while providing reliable and sufficient security. Therefore, it is important to study the security and reliability of lightweight block ciphers. SKINNY is a n...

  • Article
  • Open Access
1,079 Views
18 Pages

Brauer Analysis of Some Time–Memory Trade-Off Attacks and Its Application to the Solution of the Yang–Baxter Equation

  • Agustín Moreno Cañadas,
  • Ismael Gutierrez,
  • Odette M. Mendez,
  • Andrés Sarrazola-Alzate and
  • Jesus Antonio Zuluaga-Moreno

4 March 2025

This paper is focused on some algebraic and combinatorial properties of a TMTO (Time–Memory Trade-Off) for a chosen plaintext attack against a cryptosystem with a perfect secrecy property. TMTO attacks aim to retrieve the preimage of a given on...

  • Article
  • Open Access
1,893 Views
9 Pages

Security Analysis of DBTRU Cryptosystem

  • Xiaofei Tong,
  • Jingguo Bi,
  • Yufei Duan,
  • Lixiang Li and
  • Licheng Wang

23 September 2022

DBTRU was proposed by Thang and Binh in 2015. As a variant of NTRU, the integer polynomial ring is replaced by two binary truncated polynomial rings GF(2)[x]/(xn+1). DBTRU has some advantages over NTRU in terms of security and performance. In this pa...

  • Article
  • Open Access
2 Citations
1,550 Views
16 Pages

A Secure and Efficient White-Box Implementation of SM4

  • Xiaobo Hu,
  • Yanyan Yu,
  • Yinzi Tu,
  • Jing Wang,
  • Shi Chen,
  • Yuqi Bao,
  • Tengyuan Zhang,
  • Yaowen Xing and
  • Shihui Zheng

24 December 2024

Differential Computation Analysis (DCA) leverages memory traces to extract secret keys, bypassing countermeasures employed in white-box designs, such as encodings. Although researchers have made great efforts to enhance security against DCA, most sol...

  • Article
  • Open Access
1,125 Views
17 Pages

General Extensions and Improvements of Algebraic Persistent Fault Analysis

  • Hanbing Li,
  • Kexin Qiao,
  • Ye Xu,
  • Changhai Ou and
  • An Wang

Algebraic persistent fault analysis (APFA) combines algebraic analysis with persistent fault analysis, providing a novel approach for examining block cipher implementation security. Since its introduction, APFA has attracted considerable attention. T...

  • Article
  • Open Access
8 Citations
6,253 Views
15 Pages

10 November 2020

Ultra-large-scale matrix inversion has been applied as the fundamental operation of numerous domains, owing to the growth of big data and matrix applications. Using cryptography as an example, the solution of ultra-large-scale linear equations over f...

  • Article
  • Open Access
9 Citations
3,718 Views
13 Pages

29 December 2017

Using the algebraic state space representation, this paper studies the robust consensus of networked evolutionary games (NEGs) with attackers and forbidden profiles. Firstly, an algebraic form is established for NEGs with attackers and forbidden prof...

  • Article
  • Open Access
4 Citations
1,801 Views
18 Pages

Algebraic Persistent Fault Analysis of SKINNY_64 Based on S_Box Decomposition

  • Xing Fang,
  • Hongxin Zhang,
  • Danzhi Wang,
  • Hao Yan,
  • Fan Fan and
  • Lei Shu

22 October 2022

Algebraic persistent fault analysis (APFA), which combines algebraic analysis with persistent fault attacks, brings new challenges to the security of lightweight block ciphers and has received widespread attention since its introduction. Threshold Im...

  • Article
  • Open Access
1 Citations
1,560 Views
11 Pages

A Method for Specifying Complete Signature Randomization and an Algebraic Algorithm Based on It

  • Alexandr Moldovyan,
  • Dmitriy Moldovyan,
  • Nikolay Moldovyan and
  • Alyona Kurysheva

25 June 2024

To eliminate the limitations of signature randomization in known algebraic algorithms with a hidden group, the security of which is based on the computational complexity of solving large systems of power equations, a method for ensuring complete rand...

  • Article
  • Open Access
2 Citations
1,969 Views
17 Pages

This paper concentrates on bipartite formation control for nonlinear leader-following multi-agent systems (MASs) with fixed and switching topologies under aperiodic Denial-of-Service (DoS) attacks. Firstly, distributed control protocols are proposed...

  • Article
  • Open Access
16 Citations
5,026 Views
17 Pages

Single Trace Side Channel Analysis on NTRU Implementation

  • Soojung An,
  • Suhri Kim,
  • Sunghyun Jin,
  • HanBit Kim and
  • HeeSeok Kim

23 October 2018

As researches on the quantum computer have progressed immensely, interests in post-quantum cryptography have greatly increased. NTRU is one of the well-known algorithms due to its practical key sizes and fast performance along with the resistance aga...

  • Article
  • Open Access
1 Citations
1,087 Views
21 Pages

Solvability and Nilpotency of Lie Algebras in Cryptography and Steganography

  • Amor Hasić,
  • Melisa Azizović,
  • Emruš Azizović and
  • Muzafer Saračević

30 May 2025

This paper investigates the role of solvable and nilpotent Lie algebras in the domains of cryptography and steganography, emphasizing their potential in enhancing security protocols and covert communication methods. In the context of cryptography, we...

  • Article
  • Open Access
982 Views
24 Pages

6 August 2025

Proxy re-signature enables transitive authentication of digital identities across different domains and has significant application value in areas such as digital rights management, cross-domain certificate validation, and distributed system access c...

  • Article
  • Open Access
59 Citations
15,323 Views
16 Pages

17 May 2020

Substitution boxes (S-box) with strong and secure cryptographic properties are widely used for providing the key property of nonlinearity in block ciphers. This is critical to be resistant to a standard attack including linear and differential crypta...

  • Article
  • Open Access
1 Citations
1,685 Views
19 Pages

Flocking Control for Cucker–Smale Model Subject to Denial-of-Service Attacks and Communication Delays

  • Xiaoyu Shi,
  • Zhuangzhuang Ma,
  • Weicheng Xie,
  • Yong Yang,
  • Kai Chen and
  • Gen Qiu

This paper examines the flocking control issue of the Cucker–Smale model in the presence of denial-of-service (DoS) attacks and communication delays. In the setting of DoS attacks, the attacker only obstructs the information communication betwe...

  • Article
  • Open Access
1 Citations
2,610 Views
16 Pages

A White-Box Implementation of IDEA

  • Siyu Pang,
  • Tingting Lin,
  • Xuejia Lai and
  • Zheng Gong

15 June 2021

IDEA is a classic symmetric encryption algorithm proposed in 1991 and widely used in many applications. However, there is little research into white-box IDEA. In traditional white-box implementations of existing block ciphers, S-boxes are always conv...

  • Article
  • Open Access
9 Citations
3,064 Views
19 Pages

20 July 2023

With the advent of communication networks, protecting data from security threats has become increasingly important. To address this issue, we present a new text encryption scheme that uses a combination of elliptic curve cryptography and max-plus alg...

  • Article
  • Open Access
9 Citations
1,988 Views
19 Pages

9 July 2024

The lack of an S-Box in some lightweight cryptography algorithms, like Speck and Tiny Encryption Algorithm, or the presence of a fixed S-Box in others, like Advanced Encryption Standard, makes them more vulnerable to attacks. This proposal presents a...

  • Editorial
  • Open Access
1 Citations
5,237 Views
5 Pages

13 September 2016

Entropy is a basic and important concept in information theory. It is also often used as a measure of the unpredictability of a cryptographic key in cryptography research areas. Ubiquitous computing (Ubi-comp) has emerged rapidly as an exciting new p...

  • Article
  • Open Access
28 Citations
5,122 Views
16 Pages

25 August 2020

Although cloud storage provides convenient data outsourcing services, an untrusted cloud server frequently threatens the integrity and security of the outsourced data. Therefore, it is extremely urgent to design security schemes allowing the users to...

  • Article
  • Open Access
4 Citations
3,054 Views
16 Pages

Algebraic Properties of the Block Cipher DESL

  • Kenneth Matheis,
  • Rainer Steinwandt and
  • Adriana Suárez Corona

15 November 2019

The Data Encryption Standard Lightweight extension (DESL) is a lightweight block cipher which is very similar to DES, but unlike DES uses only a single S-box. This work demonstrates that this block cipher satisfies comparable algebraic properties to...

  • Feature Paper
  • Article
  • Open Access
2,084 Views
15 Pages

14 September 2022

A substation is the portion of a power grid that forms a link between the cyber system and the physical system. Reliability evaluation of smart substations based on a time-varying probabilistic hybrid attack graph (TVPHAG) is studied in this paper. F...

  • Article
  • Open Access
17 Citations
4,624 Views
17 Pages

Cascaded Reinforcement Learning Agents for Large Action Spaces in Autonomous Penetration Testing

  • Khuong Tran,
  • Maxwell Standen,
  • Junae Kim,
  • David Bowman,
  • Toby Richer,
  • Ashlesha Akella and
  • Chin-Teng Lin

7 November 2022

Organised attacks on a computer system to test existing defences, i.e., penetration testing, have been used extensively to evaluate network security. However, penetration testing is a time-consuming process. Additionally, establishing a strategy that...

  • Article
  • Open Access
9 Citations
4,950 Views
43 Pages

A Game-Theoretic Approach to Information-Flow Control via Protocol Composition

  • Mário S. Alvim,
  • Konstantinos Chatzikokolakis,
  • Yusuke Kawamoto and
  • Catuscia Palamidessi

18 May 2018

In the inference attacks studied in Quantitative Information Flow (QIF), the attacker typically tries to interfere with the system in the attempt to increase its leakage of secret information. The defender, on the other hand, typically tries to decre...

  • Article
  • Open Access
834 Views
25 Pages

HHL Algorithm for Tensor-Decomposable Matrices

  • Cezary Pilaszewicz and
  • Marian Margraf

We use the HHL algorithm to retrieve a quantum state holding the algebraic normal form (ANF) of a Boolean function. Unlike the standard HHL applications, we do not describe the cipher as an exponentially big system of equations. Rather, we perform a...

  • Article
  • Open Access
674 Views
18 Pages

23 February 2025

This paper addresses the problem of achieving secure consensus control in multi-agent systems (MASs) operating on directed graphs under the challenges of input saturation and periodic denial-of-service (DoS) attacks. The motivation behind this study...

  • Article
  • Open Access
1 Citations
3,795 Views
25 Pages

Locking-Enabled Security Analysis of Cryptographic Circuits

  • Devanshi Upadhyaya,
  • Maël Gay and
  • Ilia Polian

Hardware implementations of cryptographic primitives require protection against physical attacks and supply chain threats. This raises the question of secure composability of different attack countermeasures, i.e., whether protecting a circuit agains...

  • Article
  • Open Access
1 Citations
1,469 Views
19 Pages

Dynamic Recovery and a Resilience Metric for UAV Swarms Under Attack

  • Tianzhen Hu,
  • Yan Zong,
  • Ningyun Lu and
  • Bin Jiang

20 August 2025

Unmanned Aerial Swarms are attracting widespread interest in fields such as disaster response, environmental monitoring, and agriculture. However, there is still a lack of effective recovery strategies and comprehensive performance metrics for UAV sw...

  • Proceeding Paper
  • Open Access
4 Citations
2,953 Views
6 Pages

PUF Modeling Attacks Using Deep Learning and Machine Learning Algorithms

  • Nelakudite Saadvikaa,
  • Kenneth Jonathan Saketi,
  • Akshitha Gopishetti,
  • Bhavitha Degala and
  • Kiran Kumar Anumandla

9 November 2023

The rapid advancement of technology has led to the pervasive presence of electronic devices in our lives, enabling convenience and connectivity. Cryptography offers solutions, but vulnerabilities persist due to physical attacks like malware. This led...

  • Article
  • Open Access
5 Citations
2,000 Views
26 Pages

25 July 2024

Data security is one of the biggest concerns in the modern world due to advancements in technology, and cryptography ensures that the privacy, integrity, and authenticity of such information are safeguarded in today’s digitally connected world....

  • Article
  • Open Access
4 Citations
2,781 Views
24 Pages

A Hybrid Cryptosystem Incorporating a New Algorithm for Improved Entropy

  • Víctor Manuel Silva-García,
  • Rolando Flores-Carapia and
  • Manuel Alejandro Cardona-López

10 February 2024

Today, safeguarding sensitive content through encryption is crucial. This work presents a hybrid cryptosystem for images that employs both asymmetric and symmetric encryption. The asymmetric component involves applying the Diffie–Hellman protoc...

  • Article
  • Open Access
13 Citations
4,093 Views
26 Pages

Design, Hardware Implementation on FPGA and Performance Analysis of Three Chaos-Based Stream Ciphers

  • Fethi Dridi,
  • Safwan El Assad,
  • Wajih El Hadj Youssef and
  • Mohsen Machhout

In this paper, we come up with three secure chaos-based stream ciphers, implemented on an FPGA board, for data confidentiality and integrity. To do so, first, we performed the statistical security and hardware metrics of certain discrete chaotic map...

  • Article
  • Open Access
25 Citations
4,299 Views
17 Pages

MID-Crypt: A Cryptographic Algorithm for Advanced Medical Images Protection

  • Ashraf Ahmad,
  • Yousef AbuHour,
  • Remah Younisse,
  • Yasmeen Alslman,
  • Eman Alnagi and
  • Qasem Abu Al-Haija

Privacy-preserving of medical information (such as medical records and images) is an essential right for patients to ensure security against undesired access parties. This right is typically protected by law through firm regulations set by healthcare...

  • Article
  • Open Access
10 Citations
2,280 Views
22 Pages

A Dynamic Hybrid Cryptosystem Using Chaos and Diffie–Hellman Protocol: An Image Encryption Application

  • Rolando Flores-Carapia,
  • Víctor Manuel Silva-García and
  • Manuel Alejandro Cardona-López

15 June 2023

Images with sensitive content require encryption for storage and transmission. Symmetric schemes can cipher them, while an asymmetric cryptosystem can distribute the secret key safely. For this reason, we propose a dynamic hybrid cryptosystem, which...

  • Article
  • Open Access
6 Citations
2,519 Views
15 Pages

Quantum-Safe Group Key Establishment Protocol from Lattice Trapdoors

  • Teklay Gebremichael,
  • Mikael Gidlund,
  • Gerhard P. Hancke and
  • Ulf Jennehag

30 May 2022

Group communication enables Internet of Things (IoT) devices to communicate in an efficient and fast manner. In most instances, a group message needs to be encrypted using a cryptographic key that only devices in the group know. In this paper, we add...

  • Article
  • Open Access
2 Citations
2,939 Views
21 Pages

Far Wake and Its Relation to Aerodynamic Efficiency

  • Sidaard Gunasekaran and
  • Aaron Altman

18 June 2021

Correlations were found between the aerodynamic efficiency and the mean and fluctuating quantities in the far wake of a wall-to-wall SD7003 model and an AR 4 flat plate. This correlation was described algebraically by modeling the wake signature as a...

  • Article
  • Open Access
23 Citations
3,214 Views
15 Pages

16 February 2024

Elliptic curve cryptography has gained attention due to its strong resilience against current cryptanalysis methods. Inspired by the increasing demand for reliable and secure cryptographic methods, our research investigates the relationship between c...

  • Feature Paper
  • Article
  • Open Access
1 Citations
2,129 Views
9 Pages

13 May 2020

The line graph of a graph G is another graph of which the vertex set corresponds to the edge set of G, and two vertices of the line graph of G are adjacent if the corresponding edges in G share a common vertex. A graph is reflexive if the second-larg...

  • Review
  • Open Access
5,777 Views
76 Pages

26 September 2025

This review is devoted to a comprehensive analysis of modern forms of information warfare in the context of digitalization and global interconnectedness. The work considers fundamental theoretical foundations—cognitive distortions, mass communi...

  • Article
  • Open Access
23 Citations
2,993 Views
25 Pages

Chaos and Cellular Automata-Based Substitution Box and Its Application in Cryptography

  • Arslan Shafique,
  • Kashif Hesham Khan,
  • Mohammad Mazyad Hazzazi,
  • Ismail Bahkali,
  • Zaid Bassfar and
  • Mujeeb Ur Rehman

16 May 2023

Substitution boxes are the key factor in symmetric-key cryptosystems that determines their ability to resist various cryptanalytic attacks. Creating strong substitution boxes that have multiple strong cryptographic properties at the same time is a ch...

  • Article
  • Open Access
3 Citations
795 Views
32 Pages

11 August 2025

With the growing demand for secure image communication, effective encryption solutions are critical for safeguarding visual data from unauthorized access. The substitution box (S-box) in AES (Advanced Encryption Standard) is critical for ensuring non...

  • Article
  • Open Access
4 Citations
3,699 Views
16 Pages

Simplicial-Map Neural Networks Robust to Adversarial Examples

  • Eduardo Paluzo-Hidalgo,
  • Rocio Gonzalez-Diaz,
  • Miguel A. Gutiérrez-Naranjo and
  • Jónathan Heras

15 January 2021

Broadly speaking, an adversarial example against a classification model occurs when a small perturbation on an input data point produces a change on the output label assigned by the model. Such adversarial examples represent a weakness for the safety...

  • Article
  • Open Access
2 Citations
6,272 Views
18 Pages

A MILP Model for a Byzantine Fault Tolerant Blockchain Consensus

  • Vitor Nazário Coelho,
  • Rodolfo Pereira Araújo,
  • Haroldo Gambini Santos,
  • Wang Yong Qiang and
  • Igor Machado Coelho

29 October 2020

Mixed-integer mathematical programming has been widely used to model and solve challenging optimization problems. One interesting feature of this technique is the ability to prove the optimality of the achieved solution, for many practical scenarios...

  • Article
  • Open Access
10 Citations
3,923 Views
28 Pages

25 November 2019

In this article, we propose decision diagram algorithms to extract minimal cutsets of finite degradation models. Finite degradation models generalize and unify combinatorial models used to support probabilistic risk, reliability and safety analyses (...

  • Article
  • Open Access
2 Citations
1,490 Views
25 Pages

31 August 2024

Aiming at the salvo-attack problem of multiple missiles, a distributed cooperative guidance law based on the event-triggered mechanism is proposed, which enables missiles with large differences in spatial location and velocity to achieve simultaneous...

  • Article
  • Open Access
32 Citations
3,044 Views
24 Pages

16 July 2022

The double random phase encoding (DRPE) system plays a significant role in encrypted systems. However, it is a linear system that leads to security holes in encrypted systems. To tackle this issue, this paper proposes a novel optical image encryption...

of 2